Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2023 10:14

General

  • Target

    SOA_1.xls

  • Size

    1.2MB

  • MD5

    18d136d65a9ba1d8819f9dd525b507b7

  • SHA1

    095315780b4608aa3c2c998431be510a65bc8df7

  • SHA256

    f965fd659332137f24a3d7d759470200d973e9f1e17bcbe4b54ac1a84904fab9

  • SHA512

    b2580c22dbee84af55ec179b225d3c5f9e8a40010294e4fb5fcb4b6d28e58e22476ab002a9130f99642cd744b80cd0a67d7a110919528ec509d18f10cc965b82

  • SSDEEP

    24576:0uBSw6/uZyD3bV0w6/WZy43bVtEo84TA5YLp0JHOm9kyv0fLhedKwmx:v6/4K3bVH6/AP3bV7jTp9OHOmP8f97V

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SOA_1.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2624
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Roaming\igcc.exe
      "C:\Users\Admin\AppData\Roaming\igcc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Roaming\igcc.exe
        "C:\Users\Admin\AppData\Roaming\igcc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\59CBB2F6.emf

    Filesize

    1.4MB

    MD5

    a01b9617553432807b9b58025b338d97

    SHA1

    439bdcc450408b9735b2428c2d53d2e6977fa58c

    SHA256

    7a0426ed2e2349916969ff7087c0f76089fb8ce7f4627f3d11ccbc1aaefcedce

    SHA512

    312cc2563fa865d6a939fea85a520627c73ed9a95bafc98c89495f21d535dc658825be74b64f0f5c5815d1d234fc6e77a71779247e4973e39ba8dccec2f09bee

  • C:\Users\Admin\AppData\Roaming\igcc.exe

    Filesize

    619KB

    MD5

    d49b62e60e0e42b43f32adf23acfd369

    SHA1

    a6fad4d81e7995c173121574cfc2dd3d38664726

    SHA256

    2e292710afe067f1065639192d5382b772babbc91d2a6a27fff41f8d110313ee

    SHA512

    c9af6214692ddf631d3a98fa016ac569f11db7db457c11cff573f62de3ddf12069eb18028913be150e4b816b9bad1266caa6e302027e3ccb9f9a52e7f41f352c

  • C:\Users\Admin\AppData\Roaming\igcc.exe

    Filesize

    619KB

    MD5

    d49b62e60e0e42b43f32adf23acfd369

    SHA1

    a6fad4d81e7995c173121574cfc2dd3d38664726

    SHA256

    2e292710afe067f1065639192d5382b772babbc91d2a6a27fff41f8d110313ee

    SHA512

    c9af6214692ddf631d3a98fa016ac569f11db7db457c11cff573f62de3ddf12069eb18028913be150e4b816b9bad1266caa6e302027e3ccb9f9a52e7f41f352c

  • C:\Users\Admin\AppData\Roaming\igcc.exe

    Filesize

    619KB

    MD5

    d49b62e60e0e42b43f32adf23acfd369

    SHA1

    a6fad4d81e7995c173121574cfc2dd3d38664726

    SHA256

    2e292710afe067f1065639192d5382b772babbc91d2a6a27fff41f8d110313ee

    SHA512

    c9af6214692ddf631d3a98fa016ac569f11db7db457c11cff573f62de3ddf12069eb18028913be150e4b816b9bad1266caa6e302027e3ccb9f9a52e7f41f352c

  • C:\Users\Admin\AppData\Roaming\igcc.exe

    Filesize

    619KB

    MD5

    d49b62e60e0e42b43f32adf23acfd369

    SHA1

    a6fad4d81e7995c173121574cfc2dd3d38664726

    SHA256

    2e292710afe067f1065639192d5382b772babbc91d2a6a27fff41f8d110313ee

    SHA512

    c9af6214692ddf631d3a98fa016ac569f11db7db457c11cff573f62de3ddf12069eb18028913be150e4b816b9bad1266caa6e302027e3ccb9f9a52e7f41f352c

  • \Users\Admin\AppData\Roaming\igcc.exe

    Filesize

    619KB

    MD5

    d49b62e60e0e42b43f32adf23acfd369

    SHA1

    a6fad4d81e7995c173121574cfc2dd3d38664726

    SHA256

    2e292710afe067f1065639192d5382b772babbc91d2a6a27fff41f8d110313ee

    SHA512

    c9af6214692ddf631d3a98fa016ac569f11db7db457c11cff573f62de3ddf12069eb18028913be150e4b816b9bad1266caa6e302027e3ccb9f9a52e7f41f352c

  • \Users\Admin\AppData\Roaming\igcc.exe

    Filesize

    619KB

    MD5

    d49b62e60e0e42b43f32adf23acfd369

    SHA1

    a6fad4d81e7995c173121574cfc2dd3d38664726

    SHA256

    2e292710afe067f1065639192d5382b772babbc91d2a6a27fff41f8d110313ee

    SHA512

    c9af6214692ddf631d3a98fa016ac569f11db7db457c11cff573f62de3ddf12069eb18028913be150e4b816b9bad1266caa6e302027e3ccb9f9a52e7f41f352c

  • memory/2592-31-0x0000000004C70000-0x0000000004CEA000-memory.dmp

    Filesize

    488KB

  • memory/2592-23-0x000000006BC50000-0x000000006C33E000-memory.dmp

    Filesize

    6.9MB

  • memory/2592-24-0x0000000004E20000-0x0000000004E60000-memory.dmp

    Filesize

    256KB

  • memory/2592-25-0x0000000000320000-0x0000000000330000-memory.dmp

    Filesize

    64KB

  • memory/2592-22-0x0000000000850000-0x00000000008F0000-memory.dmp

    Filesize

    640KB

  • memory/2592-27-0x000000006BC50000-0x000000006C33E000-memory.dmp

    Filesize

    6.9MB

  • memory/2592-28-0x0000000004E20000-0x0000000004E60000-memory.dmp

    Filesize

    256KB

  • memory/2592-29-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2592-30-0x0000000000360000-0x000000000036A000-memory.dmp

    Filesize

    40KB

  • memory/2592-43-0x000000006BC50000-0x000000006C33E000-memory.dmp

    Filesize

    6.9MB

  • memory/2624-26-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/2624-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2624-1-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/2624-71-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/2624-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2876-34-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2876-39-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2876-37-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2876-42-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2876-45-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2876-46-0x000000006B560000-0x000000006BC4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2876-47-0x0000000004720000-0x0000000004760000-memory.dmp

    Filesize

    256KB

  • memory/2876-48-0x000000006B560000-0x000000006BC4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2876-49-0x0000000004720000-0x0000000004760000-memory.dmp

    Filesize

    256KB

  • memory/2876-35-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2876-33-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2876-32-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB